Passport Authentication Using PNG Image with Data Repair Capability

Similar documents
Authentication of grayscale document images using shamir secret sharing scheme.

A private-distributing Technique For Verification Of Grayscale Text Pictures With the Use of the PNG Image

An Improved Edge Adaptive Grid Technique To Authenticate Grey Scale Images

International Journal of Advance Research in Computer Science and Management Studies

An Optimal Pixel-level Self-repairing Authentication. Method for Grayscale Images under a Minimax. Criterion of Distortion Reduction*

A Visual Cryptography Based Watermark Technology for Individual and Group Images

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

International Conference on Advances in Engineering & Technology 2014 (ICAET-2014) 48 Page

Lossless Image Watermarking for HDR Images Using Tone Mapping

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Color PNG Image Authentication Scheme Based on Rehashing and Secret Sharing Method

Digital Image Sharing and Removing the Transmission Risk Problem by Using the Diverse Image Media

Various Visual Secret Sharing Schemes- A Review

A NEW DATA TRANSFER MATRIX METHODOLOGY FOR IP PROTECTION SCHEME

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

Reversible Data Hiding in Encrypted color images by Reserving Room before Encryption with LSB Method

Visual Secrete Sharing by Diverse Image Media

VISUAL CRYPTOGRAPHY for COLOR IMAGES USING ERROR DIFFUSION AND PIXEL SYNCHRONIZATION

International Journal of Scientific & Engineering Research, Volume 8, Issue 4, April ISSN

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

AN EXTENDED VISUAL CRYPTOGRAPHY SCHEME WITHOUT PIXEL EXPANSION FOR HALFTONE IMAGES. N. Askari, H.M. Heys, and C.R. Moloney

IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING VISUAL CRYPTOGRAPHY

Digital Image Sharing using Encryption Processes

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Watermarking patient data in encrypted medical images

Enhanced Efficient Halftoning Technique used in Embedded Extended Visual Cryptography Strategy for Effective Processing

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

An Enhanced Least Significant Bit Steganography Technique

Fragile Watermarking With Error-Free Restoration Capability Xinpeng Zhang and Shuozhong Wang

Reversible Watermarking on Histogram Pixel Based Image Features

A Recursive Threshold Visual Cryptography Scheme

CERIAS Tech Report

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Contrast Enhancement Based Reversible Image Data Hiding

Webpage: Volume 4, Issue VI, June 2016 ISSN

Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltonong Algorithms in Visual Cryptography

Printed Document Watermarking Using Phase Modulation

A STENO HIDING USING CAMOUFLAGE BASED VISUAL CRYPTOGRAPHY SCHEME

A Lossless Large-Volume Data Hiding Method Based on Histogram Shifting Using an Optimal Hierarchical Block Division Scheme *

Blind Image Fidelity Assessment Using the Histogram

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

REVERSIBLE data hiding, or lossless data hiding, hides

Digital Watermarking Using Homogeneity in Image

Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Copyright protection scheme for digital images using visual cryptography and sampling methods

Local prediction based reversible watermarking framework for digital videos

Reversible Data Hiding in JPEG Images Based on Adjustable Padding

Literature Survey on Image Manipulation Detection

Secret Sharing Image Between End Users by using Cryptography Technique

A Cost-Effective Private-Key Cryptosystem for Color Image Encryption

Visual Secret Sharing Based Digital Image Watermarking

A Novel Technique in Visual Cryptography

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Hiding Image in Image by Five Modulus Method for Image Steganography

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Secured Bank Authentication using Image Processing and Visual Cryptography

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A Copyright Information Embedding System

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

A Watermark for Image Integrity and Ownership Verification

An Implementation of LSB Steganography Using DWT Technique

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

OPTICAL WATERMARKING FOR PRINTED DOCUMENT AUTHENTICATION

Histogram Modification Based Reversible Data Hiding Using Neighbouring Pixel Differences

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

EXTENDED AND EMBEDDED VISUAL CRYPTOGRAPHY

Steganalytic methods for the detection of histogram shifting data-hiding schemes

Steganography is the idea of hiding private or sensitive data or information within

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

An Overview of Visual Cryptography Schemes for Encryption of Images

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

International Journal for Research in Technological Studies Vol. 1, Issue 8, July 2014 ISSN (online):

LSB Encoding. Technical Paper by Mark David Gan

Implementation of a Visible Watermarking in a Secure Still Digital Camera Using VLSI Design

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

Analysis of Secret Share Design for Color Image using Visual Cryptography Scheme and Halftone

EFFICIENT VISUAL CRYPTOGRAPHY FOR GENERAL ACCESS STRUCTURES WITH STAMPING AND SYNTHESIZING

Text fusion watermarking in Medical image with Semi-reversible for Secure transfer and Authentication

An Integrated Image Steganography System. with Improved Image Quality

CYCLIC COMBINATION METHOD FOR DIGITAL IMAGE STEGANOGRAPHY WITH UNIFORM DISTRIBUTION OF MESSAGE

A Simple Scheme for Visual Cryptography

Methods for Reducing the Activity Switching Factor

Hiding And Encrypting Binary Images Using A Different Approach

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

High-Capacity Reversible Data Hiding in Encrypted Images using MSB Prediction

A New Compression Method for Encrypted Images

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

Dynamic Collage Steganography on Images

Enhance Image using Dynamic Histogram and Data Hiding Technique

STEGANALYSIS OF IMAGES CREATED IN WAVELET DOMAIN USING QUANTIZATION MODULATION

Comparison of Visual Cryptographic Algorithms for Quality Images Using XOR

A Novel Approach for Hiding Huge Data in Image

Capacity of collusion secure fingerprinting a tradeoff between rate and efficiency

Data Security Using Visual Cryptography and Bit Plane Complexity Segmentation

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Fixed Unmitigated Image Cryptography Schemes

Convolutional Neural Network-based Steganalysis on Spatial Domain

Transcription:

Passport Authentication Using PNG Image with Data Repair Capability Aswathi Muralidharan, Maria Johnson, Roshna Raj, Deepika M P Abstract The system Passport Authentication Using PNG Image with Data Repair Capability introduces a passport authentication method for preventing the criminals and terrorists to travel between countries with fake or forged documentation. The more effort those countries, universities and other organizations put into verifying the identity of foreign nationals, the better the chance of keeping criminals and terrorists from entering a country and causing problems. The main aim of the proposed system is to design innovative system which deals with passport authorization management. The motto of the project is to develop a new and secure passport system and to simplify the job of the security people. In short, have a flawless passport verification system. In the proposed system, as first phase the stego image formation and as second phase, the verification stage, in this the authentication and self repairing are carried out. If part of a document image is verified to have been illicitly altered, the destroyed content can be repaired in the second phase. Such image content authentication and self-repair capabilities are useful for this security protection. In short the system proposes an authentication method that deals with binary like color document images instead of binary, grayscale ones and simultaneously solves the problem of image tampering detect `ion and visual quality keeping. Index Terms alpha channel, PNG image, secret sharing. I. INTRODUCTION Security is a growing issue in international travel for both travelers and governments. It is an important issue with the potential for criminals and terrorists to travel between countries with fake or forged documentation. The existing passport authentication system is by using watermarking technique. The aim of the system is to provide a firm association between the passport holder s photo and the holder s details by embedding hidden information in the passport photograph. During the issue of passport, a watermark can be created based on the details of the holder full name and passport number and this invisible watermark is embedded inside the passport photo such that it satisfies all the requirements of the watermarking technique. This process is carried out during the issue of the passport document at the passport office. With the help of this technique, during the passport verification process at the Manuscript received May, 2014. Aswathi Muralidharan,IT Department,ASIET, Kalady, Kerala,India Maria Johnson, IT Department,ASIET, Kalady, Kerala,India Roshna Raj, IT Department,ASIET, Kalady, Kerala,India Deepika M P, IT Department,ASIET, Kalady, Kerala,India checkpoint, computer can be used in scanning the passport photo to check whether the passport photo has been replaced by comparing the invisible watermark hidden in the passport photo with the holder s details including the full name and passport number. The existing procedure consists of three phases. The first phase deals with acquiring the required parameters for creating the watermarking. The second phase converts the holder s details into a watermark that can be embedded into the digital image. The third phase hides the watermark obtained inside the passport photo such that it meets the requirements of the watermarking.table.1 shows the comparison table of previous methods in document authentication. [4][5][6][7][8][9] Computerized technologies in authentication systems are emerging to help security professionals in handling the security of passport data explosion and increasingly complex security information. Current and future authentication systems require large amounts of information to be collected, stored, processed and managed. The security of these information systems and data is important. In order to deal with the security in passport authentication field in this paper we present a secret sharing technique with a data repair capability for color document images via the use of the Portable Network Graphics (PNG) image. Actually it is an enhancement to the already existing passport system. An authentication signal is generated for each block of the color document image. It ensures the integrity and the authenticity of a digital image. II. PROPOSED SYSTEM In our system, a method for authentication of document images/passport with an additional self-repair capability for fixing tampered image data is proposed. Data hiding which destroys the cover image and the original image along with it prevents self-repairing capability. A solution to this problem is to embed the original image data somewhere else without altering the cover image itself. An extra alpha channel in a PNG image is utilized to embed the original data image. The input cover image/photograph is assumed to be/or converted to a binary-like color image with three planes. After the proposed method is applied, the cover image is transformed into a stego-image in the PNG format with an additional alpha channel for transmission on networks or archiving in databases. The stego-image, when received or retrieved, may be verified by the proposed method for its authenticity. 1839

M. Wu & B. Liu H.Yang & A.C Kot Hae Yong Kim & Amir Afif Table 1: Comparison of previous authentication methods Advantages Manual Scoring method is automated to score pixels dynamically. Can embed large amount of data Locating embeddable pixels in a block for different block scheme are addressed. Binary/Halftone watermarking is possible. Disadvantages Flippablity score lookup table may exceed the available memory size for the large neighborhoods. Difficult to locate tampering occurred at each block. Smaller the host image the more visually noticeable will be the watermark. Printed images cannot be authenticated. sharing scheme to generate secret shares. The share values are subsequently mapped into a small range of alpha channel values near the maximum transparency value to create an imperceptibility effect. Finally, the mapped secret shares are randomly embedded into the alpha channel for the purpose of promoting the security protection and data repair capabilities.fig:1 shows the overall structure of the proposed passport authentication system. Fig.1 (a) shows the authorization part and Fig.1 (b) shows the verification part. Advantages of proposed system: The authentication is not based on only passport number or emblems or photos. The authentication is provided to the entire page of the passport. It provides data repair capability i.e., after applying the proposed method if any distortions are occurred to the image, it would be altered. Having higher possibility to survive image content attacks. Enhancing data security by secret sharing. Making use of a new type of image channel for data hiding C.H.Tzeng & W.H Tsai Image distortion is reduced There is a trade of between distortion reduction and security enhancement. Y.Lee,H.Kim & Y.Park small distortion Limited amount of embeddable data. Integrity modifications of the stego-image can be detected by the method at the block level and repaired at the pixel level. In case that the alpha channel is totally removed from the stego-image, the entire resulting image is regarded as inauthentic, meaning that the fidelity check of the image fails. Fig.1 (a). An authentication signal is generated for each block of a passport document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original passport image to form a PNG image. In this system, we propose an authentication method that deals with color document images converted into binary-like images instead of pure binary ones and simultaneously solves the problems of image tampering detection and visual quality keeping. The two main phases of the system are one the stego image formation and second, in the verification stage, the authentication and self repairing. Fig: 2 and 3 shows the different operations in these two phases. In the proposed method, a PNG image is created from a binary-like color document image with an alpha channel plane. Data for authentication and repairing are then computed from and taken as input to the Shamir secret Fig.1 (b). 1840

Fig: 2 Stego image formations. III. CONCLUSION Passport is the most important document while travelling from one country to another. It is the proof of citizenship of the country. Hence, it needs to keep secure from unauthorized use. Authentication and security of passport and checking integrity of a person on the airport is a challenging task. In order to face this challenge of security and privacy, we are proposing a secret sharing scheme based authentication method for the passport authentication via the use of PNG image with a data repair capability. The system Passport Authentication Using PNG Image with Data Repair Capability introduces a passport authentication method for preventing the criminals and terrorists to travel between countries with fake or forged documentation. In this system, a method for authentication of color passport document images with an additional self-repair capability for fixing tampered image data is proposed. IV. FUTURE WORK We have implemented the proposed system as a standalone system. It can be implemented as a website in future. Thus PAS can be accessed from anywhere in the world for both the passport issuing authorities and for the verifying authorities. Fig: 3 Authentication and repairing. 1841

APPENDIX Fig.5 shows the authentication window of the system Fig.6 shows the verification window of the system. Registration: Fig 5.(c) Fig.5(a) Fig.5 (b) Fig. 5(d) 1842

Verification: this project a success. To our friends and families, they were a great source of support and encouragement; we thank them all and wish them all the best in their lives. To our mothers and fathers, for their warm, kinds, encourages, and love. To every person gave us something to light our pathway, we thank them for believing in us. REFERENCES Registration stage: Fig. 6 1. Issuing officer registering the passport holder with his/her name and a key unique of the holder that is provided. 2. For doing that Issuing officer has to authenticate himself first. 3. Stego image is formed using the given data of the passport holder. (say, PASSPORT, based on our system) Verification stage: [1]M.Naor, A. Shamir, Visual cryptography, in: Proceedings of the Advances in Cryptology, Eurocrypt 94, in:lncs, vol.950, 1995,pp.1 12. [2].A. Shamir, _How to share a secret,_ Communications of the ACM, vol. 22, no. 11, pp.612_613, 1979. [3].P.S.Revenkar, Anisa Anjum, W.Z.Gandhare,_ Survey of Visual Cryptography Schemes _International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010 [4]. M. Wu and B. Liu, _Data hiding in binary images for authentication and annotation,ieee Trans. Multimedia, vol. 6, no. 4, pp. 528_538,Aug. 2004. [5]. H. Yang and A. C. Kot, _Binary image authentication with tampering localization by embedding cryptographic signature and block identi_er,_ IEEE Signal Process. Lett., vol. 13, no. 12, pp. 741_744, Dec.2006. [6]. H. Yang and A. C. Kot, _Pattern-based data hiding for binary images authentication by connectivity-preserving,_ IEEE Trans. Multimedia, vol. 9, no. 3, pp. 475_486, Apr. 2007. [7]. H. Y. Kim and Amir A_f, _Secure authentication watermarking for halftone and binary images,_ Int. J. Imag. Syst. Technol., vol. 14, no. 4, pp. 147_152, 2004. [8]. C. H. Tzeng and W. H. Tsai, _A new approach to authentication of binary images for multimedia communication with distortion reduction and security enhancement,_ IEEE Commun. Lett., vol. 7, no. 9, pp., Sep. 2003. [9]. Y. Lee, J. Hur, H. Kim, Y. Park, and H. Yoon, _A new binary image authentication scheme with small distortion and low false negative rates,_ IEICE Trans. Commun., vol. E90-B, no. 11, pp. 3259_3262, Nov. 2007. [10]. Che-Wei Lee and Wen-Hsiang Tsai, _A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Image with a Data Repair Capability_IEEE Transactions on Image Processing, Vol. 21, no. 1, January 2012. Ms.Aswathi Muralidharan Pursuing B.Tech in Information Technology, Adi Shankara institute of Engineering and Technology, Affiliated to M.G University, Kerala Ms.Maria Johnson Pursuing B.Tech in Information Technology, Adi Shankara institute of Engineering and Technology, Affiliated to M.G University, Kerala Ms. Roshna Raj Pursuing B.Tech in Information Technology, Adi Shankara institute of Engineering and Technology, Affiliated to M.G University, Kerala. Ms.Deepika M P working at Adi Shankara institute of Engineering and Technology as Assistant Professor in Information Technology Department. Received her M.Tech degree in Software engineering from CUSAT. Her area of interest is in Visual Cryptography. 1. Using the same key and the details, the stego image is verified by the verifier. 2. The passport is verified and authenticated, even if some part of the passport is tampered. ACKNOWLEDGMENT To the light, our god, who guided us through the way. To our institution Adi Shankara institute of Engineering and Technology, Management and our department head, for their timely support. To the project coordinators, for their great efforts of supervising and leading us, to accomplish this fine work. Extreme gratitude is conveyed to all the staff members of our department for extending their helping hands to make 1843